View Single Post
Old 05-15-2011, 07:41 PM   #2
corleorg
 
Posts: n/a
Default

If the executable file is located in a directory the user can control, use the standard user permissions to run the malicious software will be able to replace the location of any associated software will use the DLL. Additionally office 2007 key, malicious software can use the parallel features that make the application executable file or the system load a malicious DLL version. And, unless the user to click the Details button alert and carefully review the list to enhance the executable file path, or malicious software can be copied to the executable file name similar position office 2010 key, for example windows 7 key, \ ProgramFiles \ Vendor \ Application. exe (Note should be "Program Files" the contents of the missing spaces) windows 7 key, in that location, the malware will be able to control what applications load DLL. The following figure, I have a component of soft Network Monitor copied to the user-created C: \ ProgramFiles directory (the user can control the directory) windows 7 key, and start the component.
  Reply With Quote

Sponsored Links